Articles

If You Love Processing Invoices, Don’t Read This Article!

Do you enjoy filling your day by manually entering bills into your accounting system? Are you OK with spending more time than necessary on invoice management? Or would you rather be doing something more productive with your time? Very few people get a kick out of the tedium of manual bill entry. Invoice management is […]

If You Love Processing Invoices, Don’t Read This Article! Read More »

Drinking from a Fire Hose: Controlling the Flow of Information in Your Business

By Bill Constantopoulos Information is the lifeblood of any successful organization. But too much of a good thing can negatively impact performance. “Information overload” is a challenge for organizations and those tasked with managing them. Some have even compared the flow of data to “drinking from a fire hose.” Too much data, crammed into too little

Drinking from a Fire Hose: Controlling the Flow of Information in Your Business Read More »

Using Technology to Manage Financial Operations in a Dispersed Organization

By Bill Constantopoulos If we learned anything from the past few years of pandemic-induced disruption it is this: People can work efficiently and effectively from virtually anywhere. Even the bourgeoning return-to-the-office movement has adapted hybrid work weeks that blend in-person attendance with remote work. But the dispersal of workers poses a challenge to managers who

Using Technology to Manage Financial Operations in a Dispersed Organization Read More »

How to Adhere to Nonprofit Compensation Rules

Your not-for-profit organization is probably assisted by volunteers who aren’t financially compensated. But your staff — including executives — are almost certainly paid a commensurate salary and benefits for their work. Compensation issues are always tricky, but they’re made more so by tax and legal requirements for nonprofits. Setting executive pay is particularly fraught because if

How to Adhere to Nonprofit Compensation Rules Read More »

Keep Your Data Safe When Working from Home

By Nathaniel C. Gravel, CISA, CISM, CRISC The second week of January has been designated as National Home Office Safety & Security Week. But keeping your computer, network and files secure while working remotely is a 24/7/365 task. Here are eight important steps to take to help ensure your “home work” is not compromised by

Keep Your Data Safe When Working from Home Read More »

Encourage Legacy Gifts to Your Nonprofit

If your not-for-profit focuses most of its fundraising energy on donors who can contribute to your mission and programs now, you may have neglected legacy gifts. Such gifts represent a portion of wealthy donors’ estates that go to your organization on their death. Legacy gifts can help position your nonprofit for sustained growth well into the

Encourage Legacy Gifts to Your Nonprofit Read More »

Articles

All Aboard: Recruiting New Nonprofit Board Members

Does your not-for-profit need to replace a departing board director — or add directors to better handle your growing organization’s governance work? Choose carefully, because although a well-qualified, enthusiastic board addition can help infuse the group with energy and fresh ideas, an unqualified one can create conflict and other problems. Here’s how a nonprofit board should

All Aboard: Recruiting New Nonprofit Board Members Read More »

Articles

Is Office 365 Vulnerable to Cyberattack?

By Nathaniel C. Gravel, CISA, CISM, CRISC Hundreds of thousands of organizations in the U.S. and around the world rely on Microsoft’s Office 365 software suite to run their businesses. But recent events have shown that even this highly regarded software is vulnerable to penetration by increasingly sophisticated methods used by cyber criminals. The biggest

Is Office 365 Vulnerable to Cyberattack? Read More »

Articles

Where to Start with Cybersecurity

By Nathaniel C. Gravel, CISA, CISM, CRISC With an estimated 2,200 cyberattacks taking place each day – one every 39 seconds – the task of creating and deploying a defensive strategy for your business can be intimidating. Still, the threat is too great to ignore, not to mention the fact that most states have strict

Where to Start with Cybersecurity Read More »

Articles

How Simulated Phishing Can Save Your Business

By Nathaniel C. Gravel, CISA, CISM, CRISC The number one cause of cybersecurity breaches in the U.S. is human error. Statistics show that 70% of all cyber intrusions are caused by somebody clicking on the wrong link, downloading an infected attachment, or responding to an email that looked legitimate but was a deception. Collectively known

How Simulated Phishing Can Save Your Business Read More »

Scroll to Top